What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Hong Hu
Google Scholar
26
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/ndss
Too Subtle to Notice: Investigating Executable Stack Issues in Linux Systems.
Hengkai Ye
Hong Hu
2024
conf/ccs
CountDown: Refcount-guided Fuzzing for Exposing Temporal Memory Errors in Linux Kernel.
Shuangpeng Bai
Zhechang Zhang
Hong Hu
2024
conf/uss
DEEPTYPE: Refining Indirect Call Targets with Strong Multi-layer Type Analysis.
Tianrou Xia
Hong Hu
Dinghao Wu
2023
conf/uss
µFUZZ: Redesign of Parallel Fuzzing using Microservice Architecture.
Yongheng Chen
Rui Zhong
Yupeng Yang
Hong Hu
Dinghao Wu
Wenke Lee
2023
conf/uss
VIPER: Spotting Syscall-Guard Variables for Data-Only Attacks.
Hengkai Ye
Song Liu
Zhechang Zhang
Hong Hu
2022
conf/ccs
SFuzz: Slice-based Fuzzing for Real-Time Operating Systems.
Libo Chen
Quanpu Cai
Zhenbang Ma
Yanhao Wang
Hong Hu
Minghang Shen
Yue Liu
Shanqing Guo
Haixin Duan
Kaida Jiang
Zhi Xue
2022
conf/uss
FreeWill: Automatically Diagnosing Use-after-free Bugs via Reference Miscounting Detection on Binaries.
Liang He
Hong Hu
Purui Su
Yan Cai
Zhenkai Liang
2022
conf/uss
Detecting Logical Bugs of DBMS with Coverage-based Guidance.
Yu Liang
Song Liu
Hong Hu
2022
conf/ndss
COOPER: Testing the Binding Code of Scripting Languages with Cooperative Mutation.
Peng Xu
Yanhao Wang
Hong Hu
Purui Su
2021
conf/uss
Sharing More and Checking Less: Leveraging Common Input Keywords to Detect Bugs in Embedded Systems.
Libo Chen
Yanhao Wang
Quanpu Cai
Yunfan Zhan
Hong Hu
Jiaqi Linghu
Qinsheng Hou
Chao Zhang
Haixin Duan
Zhi Xue
2021
conf/uss
Preventing Use-After-Free Attacks with Fast Forward Allocation.
Brian Wickman
Hong Hu
Insu Yun
Daehee Jang
Jungwon Lim
Sanidhya Kashyap
Taesoo Kim
2021
conf/uss
Abusing Hidden Properties to Attack the Node.js Ecosystem.
Feng Xiao
Jianwei Huang
Yichang Xiong
Guangliang Yang
Hong Hu
Guofei Gu
Wenke Lee
2021
conf/sp
One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation.
Yongheng Chen
Rui Zhong
Hong Hu
Hangfan Zhang
Yupeng Yang
Dinghao Wu
Wenke Lee
2021
conf/asiaccs
Identifying Behavior Dispatchers for Malware Analysis.
Kyuhong Park
Burak Sahin
Yongheng Chen
Jisheng Zhao
Evan Downing
Hong Hu
Wenke Lee
2021
conf/ndss
WINNIE : Fuzzing Windows Applications with Harness Synthesis and Fast Cloning.
Jinho Jung
Stephen Tong
Hong Hu
Jungwon Lim
Yonghwi Jin
Taesoo Kim
2020
conf/ccs
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback.
Rui Zhong
Yongheng Chen
Hong Hu
Hangfan Zhang
Wenke Lee
Dinghao Wu
2020
conf/ndss
DESENSITIZATION: Privacy-Aware and Attack-Preserving Crash Report.
Ren Ding
Hong Hu
Wen Xu
Taesoo Kim
2019
conf/ccs
Where Does It Go?: Refining Indirect-Call Targets with Multi-Layer Type Analysis.
Kangjie Lu
Hong Hu
2019
conf/uss
RAZOR: A Framework for Post-deployment Software Debloating.
Chenxiong Qian
Hong Hu
Mansour Alharthi
Simon Pak Ho Chung
Taesoo Kim
Wenke Lee
2019
conf/uss
Fuzzification: Anti-Fuzzing Techniques.
Jinho Jung
Hong Hu
David Solodukhin
Daniel Pagan
Kyu Hyung Lee
Taesoo Kim
2018
conf/ccs
Enforcing Unique Code Target Property for Control-Flow Integrity.
Hong Hu
Chenxiong Qian
Carter Yagemann
Simon Pak Ho Chung
William R. Harris
Taesoo Kim
Wenke Lee
2016
conf/ccs
"The Web/Local" Boundary Is Fuzzy: A Security Study of Chrome's Process-based Sandboxing.
Yaoqi Jia
Zheng Leong Chua
Hong Hu
Shuo Chen
Prateek Saxena
Zhenkai Liang
2016
conf/sp
Data-Oriented Programming: On the Expressiveness of Non-control Data Attacks.
Hong Hu
Shweta Shinde
Sendroiu Adrian
Zheng Leong Chua
Prateek Saxena
Zhenkai Liang
2015
conf/uss
Automatic Generation of Data-Oriented Exploits.
Hong Hu
Zheng Leong Chua
Sendroiu Adrian
Prateek Saxena
Zhenkai Liang
2015
conf/esorics
Identifying Arbitrary Memory Access Vulnerabilities in Privilege-Separated Software.
Hong Hu
Zheng Leong Chua
Zhenkai Liang
Prateek Saxena
2013
conf/esorics
A Quantitative Evaluation of Privilege Separation in Web Browser Designs.
Xinshu Dong
Hong Hu
Prateek Saxena
Zhenkai Liang
Coauthors
Brian Wickman
(1)
Burak Sahin
(1)
Carter Yagemann
(1)
Chao Zhang
(1)
Chenxiong Qian
(2)
DaeHee Jang
(1)
Daniel Pagan
(1)
David Solodukhin
(1)
Dinghao Wu
(4)
Evan Downing
(1)
Feng Xiao
(1)
Guangliang Yang
(1)
Guofei Gu
(1)
Haixin Duan
(2)
Hangfan Zhang
(2)
Hengkai Ye
(2)
Hong Hu
(26)
Insu Yun
(1)
Jianwei Huang
(1)
Jiaqi Linghu
(1)
Jinho Jung
(2)
Jisheng Zhao
(1)
Jungwon Lim
(2)
Kaida Jiang
(1)
Kangjie Lu
(1)
Kyu Hyung Lee
(1)
Kyuhong Park
(1)
Liang He
(1)
Libo Chen
(2)
Mansour Alharthi
(1)
Minghang Shen
(1)
Peng Xu
(1)
Prateek Saxena
(5)
Purui Su
(2)
Qinsheng Hou
(1)
Quanpu Cai
(2)
Ren Ding
(1)
Rui Zhong
(3)
Sanidhya Kashyap
(1)
Sendroiu Adrian
(2)
Shanqing Guo
(1)
Shuangpeng Bai
(1)
Shuo Chen
(1)
Shweta Shinde
(1)
Simon Pak Ho Chung
(2)
Song Liu
(2)
Stephen Tong
(1)
Taesoo Kim
(6)
Tianrou Xia
(1)
Wen Xu
(1)
Wenke Lee
(7)
William R. Harris
(1)
Xinshu Dong
(1)
Yan Cai
(1)
Yanhao Wang
(3)
Yaoqi Jia
(1)
Yichang Xiong
(1)
Yongheng Chen
(4)
Yonghwi Jin
(1)
Yu Liang
(1)
Yue Liu
(1)
Yunfan Zhan
(1)
Yupeng Yang
(2)
Zhechang Zhang
(2)
Zhenbang Ma
(1)
Zheng Leong Chua
(4)
Zhenkai Liang
(6)
Zhi Xue
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to